VQ (Learning Vector Quantization) is kind of supervised and competitive learning artificial neural network and adopted in many domains, such as pattern categorization, products classification, mechanical detection. Th...
详细信息
Almost all proposed routing protocols are based on minimum hops in mobile ad hoc network. But through the research on the real communication of wireless nodes, we find that sometimes the path which has the minimum hop...
详细信息
ISBN:
(纸本)9781424435623
Almost all proposed routing protocols are based on minimum hops in mobile ad hoc network. But through the research on the real communication of wireless nodes, we find that sometimes the path which has the minimum hops from the source to the destination may not be the best path. Considered the remaining power and the node selfishness, we propose an improved AODV routing protocol, I-AODV in this paper. We use a new term, node status, regard the node status as a function of the remaining power and the fame and regard the node status as the basic condition for choosing the next hop in the new routing protocol.
An access control policy defines what is authorized, and an access control mechanism implements the policy to ensure that all accesses are in accordance with the underlying policy. Nowadays, many researcher are workin...
详细信息
An access control policy defines what is authorized, and an access control mechanism implements the policy to ensure that all accesses are in accordance with the underlying policy. Nowadays, many researcher are working for expressing access policies in a formal way. But it is still an open problem. This paper defines a policy language, which is named as PDPL to express access policies and access control properties in PDAC model [1]. This language unifies ldquoBANrdquo logic with past- and future- time temporal logic. We give the syntax and semantics of PDPL, and provided some examples with their English equivalents. This logic language can express belief and authorization in access control model. And it can deal with delegations of decision-making directly. It is easy for us to formulate the properties of interest in distributed systems of PDAC model through PDPL. This logical language is part of a formal system, and it will be used in an automatic model checker in the future.
Otsu adaptive thresholding is widely used in classic image segmentation. Two-dimensional Otsu thresholding algorithm is regarded as an effective improvement of the original Otsu method. To reduce the high computationa...
详细信息
Otsu adaptive thresholding is widely used in classic image segmentation. Two-dimensional Otsu thresholding algorithm is regarded as an effective improvement of the original Otsu method. To reduce the high computational complexity of 2D Otsu method, a fast algorithm is proposed based on improved histogram. Two-dimensional histogram is projected onto the diagonal, which forms 1D histogram with obvious peak and valley distribution. Then two-dimensional Otsu method is applied on a line that is vertical to the diagonal to find the optimal threshold. Furthermore, three look-up tables are utilized to improve the computational speed by eliminating the redundant computation in original two-dimensional Otsu method. Theoretical analysis and experimental simulation show that the proposed approach greatly enhances the speed of thresholding and has better immunity to salt and pepper noise.
Faced with the general trend of centralization of information, the biggest challenge to enterprise is how to ensure that all fixed computers and different mobile devices anywhere can access securely and quickly enterp...
详细信息
In this paper, we propose an algorithm WMTA (wireless multimedia transmission algorithm) for multimedia transmission control over wireless-wired IP networks. The relationship between packet length and packet loss rate...
详细信息
In this paper, we propose an algorithm WMTA (wireless multimedia transmission algorithm) for multimedia transmission control over wireless-wired IP networks. The relationship between packet length and packet loss rate over the Markov wireless error model is investigated. Based on this character, the algorithm can detect the nature of packet losses by sending large and small packets alternately, and control the sending rate of nodes. Furthermore, by use of an updating factor K, the algorithm can adapt to the changes of network states quickly. Extensive computer simulations demonstrate that the proposed scheme is effective in satisfying the end to end quality of service and reducing the congestion loss rate in various network topologies.
Support vector machine is kind of novel machine learning method, based on statistical learning theory, which becomes the hotspot of machine learning because of its excellent learning performance. The method of support...
详细信息
This paper proposes a new approach to dynamically determine the tree span for tree kernel-based semantic relation extraction. It exploits constituent dependencies to keep the nodes and their head children along the pa...
详细信息
This paper proposes a context-sensitive convolution tree kernel for pronoun resolution. It resolves two critical problems in previous researches in two ways. First, given a parse tree and a pair of an anaphor and an a...
详细信息
This paper proposes a semi-supervised learning method for relation extraction. Given a small amount of lab.led data and a large amount of unlab.led data, it first bootstraps a moderate number of weighted support vecto...
详细信息
暂无评论